[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1KfMrQ-0003JT-AI@titan.mandriva.com>
Date: Mon, 15 Sep 2008 16:48:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:182-1 ] wordnet
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:182-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : wordnet
Date : September 15, 2008
Affected: 2008.0, 2008.1
_______________________________________________________________________
Problem Description:
Rob Holland found several programming errors in WordNet which could
lead to the execution or arbitrary code when used with untrusted input
(CVE-2008-2149, CVE-2008-3908).
Update:
The previous patch had a typo that caused incorrect behaviour in
WordNet. This update uses an update patch that corrects the issue
and also notes the additional assigned CVE name for these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3908
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.0:
1d0d82775493396e34971c884cbabc01 2008.0/i586/libwordnet3.0-3.0-6.2mdv2008.0.i586.rpm
eceaba3f5a49a9006bc415e778651bf2 2008.0/i586/libwordnet3.0-devel-3.0-6.2mdv2008.0.i586.rpm
96fb48c0c5a8b91884294f93bbe47399 2008.0/i586/wordnet-3.0-6.2mdv2008.0.i586.rpm
494942f67dad01f8223f20ec9a255cff 2008.0/SRPMS/wordnet-3.0-6.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
45a324ee32d6fa613a862b4d905f4738 2008.0/x86_64/lib64wordnet3.0-3.0-6.2mdv2008.0.x86_64.rpm
e220080ca764c251d274f7ced28ea5fb 2008.0/x86_64/lib64wordnet3.0-devel-3.0-6.2mdv2008.0.x86_64.rpm
149fb69b656abf7360b750882931de41 2008.0/x86_64/wordnet-3.0-6.2mdv2008.0.x86_64.rpm
494942f67dad01f8223f20ec9a255cff 2008.0/SRPMS/wordnet-3.0-6.2mdv2008.0.src.rpm
Mandriva Linux 2008.1:
fdbb49dbd64ed7635088b9ee613e5786 2008.1/i586/libwordnet3.0-3.0-6.2mdv2008.1.i586.rpm
361e9bb12cdf618a12fcd7df41a98690 2008.1/i586/libwordnet3.0-devel-3.0-6.2mdv2008.1.i586.rpm
e1888e6cbad6140e67932764a479fee7 2008.1/i586/wordnet-3.0-6.2mdv2008.1.i586.rpm
ed24b17d2cfc64cdc814de1114a94f4b 2008.1/SRPMS/wordnet-3.0-6.2mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
26ca8beb8ffa8a778e290248221fe204 2008.1/x86_64/lib64wordnet3.0-3.0-6.2mdv2008.1.x86_64.rpm
5bc62faa924d2b633249ed486e3396df 2008.1/x86_64/lib64wordnet3.0-devel-3.0-6.2mdv2008.1.x86_64.rpm
ba9444c750762049a65de3c3dd5732af 2008.1/x86_64/wordnet-3.0-6.2mdv2008.1.x86_64.rpm
ed24b17d2cfc64cdc814de1114a94f4b 2008.1/SRPMS/wordnet-3.0-6.2mdv2008.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIzrm8mqjQ0CJFipgRAqZlAJoDgRLNqGF1rUvWyRg155zYBBfMMgCgsn3L
kV5nr5LIuN3OR9VR22x5AvM=
=5o2b
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists